您好,欢迎光临本网站![请登录][注册会员]  
文件名称: Machine Learning and Data Mining for Computer Security
  所属分类: C++
  开发工具:
  文件大小: 2mb
  下载次数: 0
  上传时间: 2009-09-05
  提 供 者: zhujie2*******
 详细说明: Intrusion detection and analysis has received a lot of criticism and publicity over the last several years. The Gartner report took a shot saying Intrusion Detection Systems are dead, while others believe Intrusion Detection is just reaching its maturity. The pr oblem that few want to admit is that the current public methods of intrusion detection, while they might be mature, based solely on the fact they have been around for a while, are not extremely sophisticated and do not work very well. While there is no such thing as 100% security, people always expect a technology to accomplish more than it currently does, and this is clearly the case with intrusion detection. It needs to be taken to the next level with more advanced analysis being done by the computer and less by the human. The current area of Intrusion Detection is begging for Machine Learning to be applied to it. Convergence of these two key areas is critical for it to be taken to the next level. The problem is that I have seen little research focusing on this, until now. After reading Machine Learning and Data Mining for Computer Security, I feel Dr Maloof has hit the target dead centre. While much research has been done across Computer Security independently and Machine Learning independently, for some reason no one wanted to cross-breed the two topics. Dr Maloof not only did a masterful job of focusing the book on a critical area that was in dire need of research, but he also strategically picked papers that complemented each other in a productive manner. Usually reading an edited volume like this, the chapters are very disjointed with no connection between them. While these chapters cover different areas of research, there is a hidden flow that complements the previous chapter with the next. While Dr Maloof points out in his Preface the intended audience, I feel that there are two additional critical groups. Firstly, I feel that any vendor or solution provider that is looking to provide a competitive advantage for their product should read this book and see exactly what the potential of next generation intrusion detection can provide. Secondly, I feel that any Computer Science student should read this book to understand the power of convergence across technologies. Everyone is searching for new solutions to intrusion detection within Computer Science and more specifically within Computer Security. But until they are willing to take a step back and provide insight and knowledge from another domain, like Dr Maloof has done, they will not find suitable answers. This book is a must read for anyone interested in how research can improve computer security It also provides insight into additional areas of research that can be pursued. The criteria to measure a book like this is: ‘Does it get you thinking and does it nurture the creative juices from within?’ The short answer is absolutely. After reading this book, I was writing down several additional areas that I wanted to research and pursue as follow-on to reading this book. That is a key mark of a valuable book! Dr Eric Cole, Computer Security Expert ...展开收缩
(系统自动生成,下载前可以参看下载内容)

下载文件列表

相关说明

  • 本站资源为会员上传分享交流与学习,如有侵犯您的权益,请联系我们删除.
  • 本站是交换下载平台,提供交流渠道,下载内容来自于网络,除下载问题外,其它问题请自行百度
  • 本站已设置防盗链,请勿用迅雷、QQ旋风等多线程下载软件下载资源,下载后用WinRAR最新版进行解压.
  • 如果您发现内容无法下载,请稍后再次尝试;或者到消费记录里找到下载记录反馈给我们.
  • 下载后发现下载的内容跟说明不相乎,请到消费记录里找到下载记录反馈给我们,经确认后退回积分.
  • 如下载前有疑问,可以通过点击"提供者"的名字,查看对方的联系方式,联系对方咨询.
 相关搜索: Data Mining Computer Security
 输入关键字,在本站1000多万海量源码库中尽情搜索: